REFERENCES

Abrams, M. & Bailey, D. ( 1995). Abstraction and refinement of layered security policy. In M. Abrams, S. Jajodia, & H. Podell (Eds.), Information security: An integrated collection of essays, pp. 126–136. Los Alamitos, CA: IEEE Computer Society Press.

Alner, M. ( 2001). The effects of outsourcing on information security. Information Systems Security, 35–43.

Dash, J. ( 2002). Training: Spending to rise for business, security skills. Computer World, 36(3), 30, January 14.

Dinnie, G. ( 1999). The second annual global information security survey. Information Management & Computer Security. 7 (3), 112–120.

Fraser, B. ( 1997). RFC 2196: Site security handbook. Available online at: http://www.faqs.org/rfcs/rfc2196.html. Retrieved on April 13, 2002.

Free Software Foundation (FSF). ( 2002). Licenses. Available online at: http://www.gnu.org/licenses/licenses.html. Retrieved on March 30, 2002.

Gill, L. ( 2002). Does open-source software really work? News Factor Network. Available online at: http://www.newsfactor.com. Retrieved on March 28, 2002.

Guttman, B. & Bagwill, R. ( 1997). Internet security policy: A technical guide. Available online at: http://csrc.nist.gov/isptg/. Retrieved on August 1, 2001.

Internet Security Systems (ISS). ( 2002). Internet Risk Impact Survey. Available online at: http://www.iss.net. Retrieved on April 6, 2002.

Lodin, S. ( 1999). Intrusion detection product evaluation criteria. Computer Security Journal. XV(2), 1–10.

McBride, P., Patilla, J., Robinson, C., Thermos, P., & Moser, E. ( 2000). Secure Internet practices. Boca Raton, FL: Aurbach Publishers.

Periera, B. ( 2001). Management services: The next wave in facilities management. Network Magazine (India Edition), 17–19, October.

Shankland, S. ( 2001). Open-source approach fades in tough times. CNET News. Available online at: http://news.com.com/2100-1001-276056.html. Retrieved on April 1, 2002.

Spinellis, D., Kokolakis, S., & Gritzalis, S. ( 1999). Security requirements, risks and recommen-dations for small enterprise and home-office environments. Information Management & Computer Security, 7(3), 121–128.

Sridhar, V. & Bhandari, R. ( 2002). Security solutions: Be holistic, buy best. Voice & Data, 8(7), 92–97.

Stallings, W. ( 2000). Cryptography and Network Security. New Delhi: Pearson Education Asia.

Swift, B. ( 2001). Opening up a discussion on computing: Finding security alternatives and more. Risk Management, 26–32.

von Solms, R., von Solms, & Caelli, S.H. ( 1994) A framework for information security evaluation. Information & Management, 26, 143–153.

von Solms, R. ( 1998). Information security management (2): Guidelines to the management of information technology security. Information Management & Computer Security. 6(5), 221–223.

Weissman, C. ( 1995). Penetration testing. In M. Abrams, S. Jajodia & H. Podell (Eds.), Information Security: An Integrated Collection of Essays. (pp. 126–136) Los Alamitos, CA: IEEE Computer Society Press.

Whitman, M., Townsend, A., & Aalberts, R. ( 2000). Information systems security and the need for policy. In G. Dillon (Ed.), Information security management: Global challenges in the new millennium, (pp. 9–18). Hershey, PA: Idea Group Publishing.

Zwicky, E., Cooper, S., & Chapman, B. ( 2000). Building Internet firewalls (2nd ed.). Sebastopol, CA: O Reilly.



Annals of Cases on Information Technology
SQL Tips & Techniques (Miscellaneous)
ISBN: B001KZAZTK
EAN: 2147483647
Year: 2005
Pages: 367

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net